INSIDE. Symantec Brightmail AntiSpam 6.0: A Product Overview
|
|
|
- Melina Watkins
- 10 years ago
- Views:
Transcription
1 Antispam TECHNOLOGY BRIEF Symantec Brightmail AntiSpam 6.0: A Product Overview INSIDE The growing volume of spam Architecture and deployment Powerful spam and threat protection Administration made simple Conclusion
2
3 Table of Contents Executive summary What s new in version The growing volume of spam Architecture and deployment Mail flow summary A closer look: the Scanner and Control Center Spam analysis and filter production (the BLOC) Flexible deployment options Powerful spam and threat protection Multilayered spam prevention Automatic protection against fraud and phishing Eliminating viruses and mass-mailing worms Building content filters to enforce company policies Administration made simple Centralized Web-based administration Flexible group policies to handle filtered mail Automated filter delivery and deployment Filtering customization Brightmail Reputation Service Multiple quarantine options System monitoring Empowering users Conclusion
4 Executive summary As both the volume and the associated costs of spam continue to grow unabated, organizations are demanding more from antispam vendors. In the past, ad hoc solutions were sufficient until users found themselves buried under a mountain of unsolicited mail. Organizations are turning to vendors that are intensely committed to the antispam space. For antispam products, the bar has been raised; vendors that simply retrofit antispam protection from existing products, such as content filtering or general-purpose messaging, are missing the mark. Companies want a powerful and aggressive antispam solution, yet they have no tolerance for false positives or extensive end-user administration. Solutions should be easy to deploy and administratively simple, yet adaptable to incorporate countermeasures that fight the everchanging tactics of today s spammers. They must also be able to dynamically adapt to combat emerging threats such as phishing and fraud. This technology brief includes the following topics: The growing volume of spam. A look at the drivers and the implications of spam. The Symantec Brightmail AntiSpam architecture. A high-level view of the architecture and deployment options. Powerful antispam and threat protection. An overview of the main features of the Symantec Brightmail AntiSpam software. Administration made simple. A summary of the powerful administrative tools that allow administrators to centrally manage and monitor filtering. Symantec Brightmail AntiSpam software protects over 2,500 of the world s leading enterprises, including Avaya, ebay, Bechtel, Booz Allen Hamilton, Cypress Semiconductor, Deutsche Bank, Lucent Technologies, and Terra Lycos. As the most-deployed commercial antispam solution, Symantec Brightmail AntiSpam now protects more than 300 million mailboxes worldwide, including over 5 million enterprise users. These customers count on Symantec for its expertise in spam filtering, its logical and flexible approach to fighting spam at the customer site, and its ongoing commitment to countering spammers tactics. What s new in version 6.0 Here are some of the features that have been added or enhanced in this version: New Web-based administration center. The Control Center allows administrators to centrally manage all computers running Symantec Brightmail AntiSpam software from a Web browser. In addition to consolidating configuration, reporting, logging, and other tasks, the Control Center now also houses Quarantine. Group policies to manage filtered mail. You can now customize mail handling and per-verdict actions for groups of users, identified by addresses or domain names. Improved filtering technologies. Among the filtering enhancements are the incorporation of the Brightmail Reputation Service for accurate sender-based filtering, added defenses against non- English spam, new attachment signatures to capture images and other embedded content, and updated URL filters. Other enhancements. This version provides even more preset reports (now separated by spam and virus), new non-english language identification abilities, additional features for the Brightmail Plug-In for Outlook, and much more. 1
5 The growing volume of spam The growth trend of spam shows no sign of abating. The chief reasons for the growth of spam in the enterprise are: The increasing dependence on . As the primary form of business communication, has become mission-critical in the enterprise. Spammers have a captive audience. The economics of spam. Processing, bandwidth, address acquisition, and software costs continue to fall: spammers need only capture a small response rate to make a profit. The adaptability of spammers. The attractive economics of the spam business, together with the technical ability and ingenuity of spammers, is a potent combination. This increase in both the volume and percentage of spam and other threats not only drains IT resources and business productivity, it also affects how end users view and antispam filtering. As shown in Figure 1, antispam solutions need to block a correspondingly larger percentage of spam to reduce the actual number of spam users receive. Spam volume 10 messages 25 messages 50 messages Spam catch rate: 60% 4 spam messages get through 10 spam messages get through 20 spam messages get through Spam volume 10 messages 25 messages 50 messages Spam catch rate: 90% 1 spam message gets through 3 spam messages get through 5 spam messages get through Figure 1. Antispam effectiveness The best antispam solutions have: The highest possible effectiveness rate in order to compensate for the escalating volume of spam The lowest possible false positive rate Low to zero administration 2
6 Architecture and deployment The power of Symantec Brightmail AntiSpam begins with its architecture: client/server filtering software backed by Symantec s global research, threat detection, and filter production operations. Working in popular enterprise environments and operating systems, including Windows, Linux, and Solaris, Symantec Brightmail AntiSpam does not rely on a custom mail transfer agent (MTA). Instead, Symantec Brightmail AntiSpam works across multiple mail servers such as Exchange and Sendmail and does not disrupt current systems. Administrators benefit from this architectural decision in many ways: Integration. The integration of filtering software with existing, well-known messaging systems in lieu of reinventing the wheel with proprietary SMTP services allows Symantec to focus its best technical resources on optimizing antispam protection. The architecture also produces cost savings in infrastructure and training by using familiar MTAs. Failover. In addition to failing over to multiple filtering servers in the unlikely event that the antispam protection momentarily fails the server can still deliver mail. Scalability. Leveraging best-of-breed messaging technologies supports scalability Symantec Brightmail AntiSpam easily scales to millions of mailboxes. And because Symantec Brightmail AntiSpam is not licensed on a per-server basis, you can add as many servers as needed. This section takes a closer look at the architecture and deployment possibilities for Symantec Brightmail AntiSpam. It also covers the two unique services managed by Symantec: the Probe Network and the BLOC (Brightmail Logistics and Operations Center). Mail flow summary As mail flows into your mail servers, Symantec Brightmail AntiSpam software running at your site analyzes and filters mail using a variety of techniques, incorporating up-to-the-minute filters from the BLOC. Along with standard methods such as heuristics and pattern matching, Symantec Brightmail AntiSpam incorporates many proprietary filtering methods, such as advanced signature technologies and reputation-based source filters. Filters are continuously and automatically refreshed by the BLOC to combat the latest spam and other threats. Administrators can set up centralized policies to perform a variety of actions based on the verdict assigned to each message. For example, administrators can immediately delete spam identified by Symantec Brightmail AntiSpam or choose to route spam to a central Web-based quarantine for a specific set of users. Secure Rule Transmission from the BLOC Customer Site Symantec Brightmail AntiSpam Server (e.g., Exchange, Domino ) Spam Gateway Quarantine Junk Submissions to Symantec User Mailbox Spam Messages Figure 2. Symantec Brightmail AntiSpam at your site 3
7 A closer look: the Scanner and Control Center Two key software components power Symantec Brightmail AntiSpam: Scanner component. Performs filtering. You can have one or many Scanners in your Symantec Brightmail AntiSpam installation. Control Center. Enables Web-based configuration and administration. With a single Control Center, you centrally configure, monitor, and manage all the Scanners in your network. The Control Center contains Quarantine, an optional storage area for caught spam. These components can reside on the same computer, or they can be balanced across different machines to meet your mail flow and performance needs. SMTP in Statistics and logging information to the Control Center HTTP polling for filter updates Scanner Component Spam Legit Mail Configuration information from the Control Center Scanner Can reside on same machine as the Control Center or on a separate machine Includes the following components: Server component that provides verdicts on messages Client component that is integrated with the MTA Filtering engine Management agent that communicates with the Control Center Scanner Scanner Scanner Scanner End Users Log into personal quarantine Control Center Control Center Centrally manages all Scanners Provides Quarantine access Consolidates logging and reporting Administrator Logs into Control Center to manage and view status for all Scanners Logs into administratoronly quarantine (if enabled) Figure 3. Scanner and Control Center software components 4
8 Spam analysis and filter production (the BLOC) To defend against the constantly changing tactics of spammers, Symantec staffs 24x7 spam-fighting operations centers in North America, Europe, and Asia. Collectively known as the BLOC, these distributed spam-fighting facilities are key components of the Symantec Brightmail AntiSpam architecture. A prime responsibility of the BLOC is management of the Probe Network, an extensive array of over 2 million decoy addresses, also known as spamtraps or honeypots. This patented global network of accounts attracts and collects large quantities of spam tens of millions of spam messages pass through the Probe Network every day. Symantec uses these decoys to stay current with the very latest spamming tactics. Messages flow directly from the Probe Network to the BLOC for analysis. Then, sophisticated tools and automated processes go into action, analyzing incoming spam and developing effective countermeasures. The BLOC also develops and tunes other more proactive filters, such as heuristic-based filters. Such filters, which examine characteristics and behaviors that are unique to spam messages, are effective against spam that has not flowed into the Probe Network. Approximately every 10 minutes, antispam filters are pulled down over a secure connection to the Scanners, where the filters are immediately put into action. The Symantec Brightmail AntiSpam architecture represents a constant feedback loop, starting and ending with your site: 1. The installed Scanner executes filters based on real-time information from the Probe Network and the BLOC. 2. The Scanner constantly reports back to the BLOC regarding the effectiveness of deployed filters. If necessary, adjustments are made in real time to improve effectiveness. 3. Using their clients, users at your site can choose to easily submit missed spam messages to Symantec, increasing the breadth and reach of the Probe Network with the click of a button. Some Facts About the BLOC Spam defense coverage: 24x7 Languages spoken: 12 Decoy accounts monitored: Over 2 million Decoy (honeypot) spam processed/day: Tens of millions Countries represented by the Probe Network: Over 20 Operations center locations: San Francisco Dublin Sydney Taipei Flexible deployment options Symantec Brightmail AntiSpam supports a variety of on-site deployment options, based on your mail infrastructure, total mailboxes, and the available messaging expertise. As shown in Figure 4, Symantec Brightmail AntiSpam is usually set up in the following locations: At the gateway or perimeter. Symantec Brightmail AntiSpam resides at the outermost gateway layer. This layer contains the gateway MTA, which processes inbound mail and relays it to other relay layers or to the user-facing message store layer. At a post-gateway or internal relay layer. MTAs at the gateway layer accept mail from the Internet and relay unfiltered mail to the MTA that is integrated with Symantec Brightmail AntiSpam software. The Scanner filters mail from the gateway layer and relays mail to other MTAs downstream. At the native server. Symantec Brightmail AntiSpam integrates with the internal mail server, at the last node in any relay chain. 5
9 <100 Mailboxes Smaller organizations typically run all Symantec software on the same computer as their mail server Mailboxes Medium size organizations with high message volumes often run Symantec software on a separate server to minimize the load on the mail server >500 Mailboxes Larger organizations optimize for availability and performance by placing Scanners on dedicated, redundant gateway servers Internet Control Center Scanner server Internet Control Center Scanner Gateway MTA Gateway Deployment Server Internet Scanner Gateway MTA Internet DMZ Scanner Gateway MTA Legend Control Center: Includes administrator interface, and the Quarantine (administrator and end user) Scanner: Includes server component and/or client component (integrated with MTA), filtering engine, and supporting components server: E.g., Exchange Internet Internal MTA Control Center Scanner Post-Gateway Deployment Server Server Control Center Figure 4. Sample deployment scenarios Although most customers prefer the control, security, and privacy benefits inherent in deploying Symantec software on-site, the Powered by Symantec program allows you to consider other form factors for Symantec software. Table 1 summarizes the advantages and considerations regarding the available deployment options. 6
10 Table 1. Symantec Brightmail AntiSpam deployment options Deployment Advantages Considerations Gateway Fights spam at the point of entry. Because spam emanates from the outside world, the gateway is the logical and effective place to deploy the Scanner. Saves resources. By deploying closer to the gateway, you catch spam before it travels through the internal network and consumes bandwidth and storage. Some organizations prefer to have secure gateways with no other services running. In these environments, all other services (including antispam) run behind the first gateway layer. Some smaller organizations do not have dedicated gateway servers or a gateway layer. Instead, they deploy gateway servers and internal mail servers on the same machine. Post-gateway relay Reduced downtime. From an architecture perspective, this method often requires the least amount of downtime. Administrators can build the system, test it, and when it s ready, plug it into production. Multiple services on one machine. This is an efficient way to deploy Symantec Brightmail AntiSpam in a multilayered scenario on one box. For example, you can easily run antispam, antivirus, and other services on one physical machine. Ensure that there are enough available resources on the post-gateway computer if it is running other services (e.g., antivirus, content filtering). server Integrated solution. This option is ideal for smaller customers that cannot deploy new servers. Plug-and-play. If you run Microsoft Exchange as your internal mail server, this option requires no configuration changes to SMTP. If you are running multiple mail servers, you will need to install multiple instances of the Scanner. Hosted Solutions (Powered by Symantec) Appliance Solutions (Powered by Symantec) Symantec s hosted partners incorporate Symantec Brightmail AntiSpam in their messaging solutions and services for security and boundary protection. Advantages of hosted management of include possible cost savings, access to guaranteed service levels, as well as expert help with problematic messaging issues. Outsourcing can be a good choice for small businesses or other organizations without in-house messaging expertise and resources. Symantec s appliance partners integrate Symantec Brightmail AntiSpam in self-contained gateway hardware products that you install at your site. These appliances are preconfigured with the necessary operating system and application software. An appliance-based solution can save your organization some of the costs associated with server administration, hardware purchases, operating system licensing, and software integration. Powerful spam and threat protection Symantec Brightmail AntiSpam provides protection against the following broad categories of threats: Spam. Leveraging Symantec s expertise in developing accurate and effective filters, the primary level of antispam protection comes in the form of targeted filters disseminated by the BLOC. Malicious content. This category includes viruses, mass-mailing worms, and the burgeoning threat of fraud. Symantec provides specific countermeasures for content of this type. Other categories. Some sites need to extend filtering to enforce company-specific policies, for example, limiting the attachment sizes for incoming mail. The Custom Filters Editor provides an easy way to create such special-purpose content filters. 7
11 Multilayered spam prevention To keep up with the latest spam attacks, the BLOC employs automated filter creation tools and delivery technologies, delivering updated filters to Scanners approximately every 10 minutes. As Figure 5 shows, the filters managed by Symantec are only a part of a larger arsenal of filters, including optional filters and lists maintained by administrators and end users. Such an antispam combination is necessary because complex spam attacks require multiple targeted filters and approaches. Different techniques are effective against different types of spam. Incoming Mail Content Allowed Blocked Brightmail Signatures URL Heuristic Language Filters Senders Senders Reputation Filters Filters ID List List Service Symantec Brightmail AntiSpam Technologies and Architecture Spam Score Available Actions: Reputation Filtering URL Filters Heuristics Deliver to Inbox Trojan sources High-volume spam sources Safe sources Fraud URLs Mail URLs HTTP URLs Adult URLs Header analysis Foreign language Content analysis Structural analysis Delete Folder Signatures Body hash Body fuzzy signatures Attachment signatures AntiSpam Architecture Probe Network BLOC technicians Redundant architecture Real-time filter delivery Fraud detection Automated QA Customer-Defined Filters Personal allow list Save to Disk Personal block list Personal language filters Content filters Allowed senders list Blocked senders list Quarantine Filter Managed by Symantec Filter Managed by Customer Forward Modify Figure 5. Multiple antispam technologies Automatic protection against fraud and phishing Fraudulent messages a dangerous new form of spam attacks are messages that appear to be sent from a legitimate company s Web site or domain address, but in fact are not. In reality, spammers are hijacking the company s brand to attract the attention of customers and potential customers, often to gain personal information (i.e., phishing). Figure 6 shows the number of fraudulent s filtered by Symantec. 4B 4.13 Billion in July B 2B 1B 0B Aug. Sept. Oct. Nov. Dec. Jan. Feb. March Apr. May June July A Growing Category of Spam: Fraudulent currently accounts for over 5% of the spam filtered by Symantec. Figure 6. Number of fraudulent s filtered by Symantec 8
12 Because Symantec sees more than 20% of the world s traffic and filters over 104 billion messages every month, it is in a unique position to monitor the Internet for fraud targeting companies worldwide. Leveraging this detection network, Symantec produces timely antifraud and anti-phishing filters. These filters are automatically incorporated into Symantec Brightmail AntiSpam, ensuring that your end users do not receive these messages. Eliminating viruses and mass-mailing worms The Scanners can optionally filter the attachments of incoming in search of viruses and can clean infected mail. If enabled, antivirus filtering is the first filtering process performed. If no viruses are detected, the message is passed on for spam and other filtering. Upon detection of viruses, the policies you have specified go into effect. For example, the message could be deleted or it could be cleaned and delivered to the recipient s inbox. Virus filtering through Symantec Brightmail AntiSpam also provides an important defense against mass-mailing worms, a general class of viruses that use to propagate. Depending on the payload and the variant, these worms often leave hundreds of spam messages in their wake. The Worm Auto-Delete feature automatically removes not only the worm but also the associated s. This convenient feature saves users from potentially having to wade through hundreds of inbox messages that, although clean from viruses, serve no valuable purpose. Table 2. Benefits of deploying antivirus protection Antivirus Feature Flexible, responsive, and effective antivirus technology Benefit Delivers virus definition and engine updates from Symantec as soon as they are available 24x7 monitoring Ensures high level of protection against ever-changing threats Advanced filtering and analysis Employs heuristics to catch undiscovered viruses Decomposes messages down to multiple levels Robust and scalable architecture Supports networks of any size (regional to international) Avoids impeding message traffic by cleaning messages offline Can be placed as a relay in front of your system Ease of administration Provides statistics showing the number and percentage of viruses caught Building content filters to enforce company policies While most administrators never need to write filters to augment filters created by Symantec, the graphical Custom Filters Editor provides an easy way to create global, server-level filters that: Filter from marketing lists that generate user complaints or use up excessive bandwidth Filter out oversized messages Block specific types of adult content Block chain letters Custom Filters Editor As with other spam and suspected spam verdicts, administrators can specify how the Scanner treats messages that are filtered by the content filters. 9
13 Administration made simple Symantec Brightmail AntiSpam provides the following features that support easy administration: Centralized Web-based administration Group policies to manage filtered mail Automated filter delivery and deployment Filtering customization Multiple quarantine choices System monitoring Control Center Centralized Web-based administration Symantec Brightmail AntiSpam features the Control Center, a crossplatform, Web-based interface that centralizes all administrative tasks. The Control Center lets you view information on system status, administer the Quarantine, modify settings for all Scanners and other components, configure event-based alerts, and more all from one intuitive interface. Other key features are: Consolidated reporting and logging. To view aggregate reports, filtering summaries, and log information from all your Scanners. Role-based administration. To balance administration tasks, you can create additional administrator accounts, granting each administrator the desired level of management privileges for different components of Symantec Brightmail AntiSpam. For example, you might want to delegate management of Quarantine to another administrator, who will only be able to view and modify Quarantine settings. Flexible group policies to handle filtered mail Symantec Brightmail AntiSpam provides a wide variety of actions for different categories of filtered . For example, you can delete messages identified as spam by Symantec and quarantine suspected spam. Although you can set identical options for all users, different groups in your organization may have unique filtering needs. Figure 7 demonstrates how group policies let you align specific handling options with arbitrary groups that you define. Symantec Brightmail AntiSpam Global Policies Default Domain Legal HR Action to Take on Spam: Delete Quarantine for Legal Review Delete Action to Take on Suspected Spam: Quarantine for Administrative Review Quarantine for Legal Review Quarantine for HR Review Rationale: Users inboxes should be free of spam For compliance, Legal needs to store for a specified time Company policy dictates that an HR representative must review all non-spam messages sent to Human Resources Department Figure 7. Different filtering policies for different groups 10
14 Administrators can specify groups of users based on addresses or domain names. For each group, administrators can specify filtering actions for various categories of (see Table 3). Table 3. Message categories identified by Symantec Brightmail AntiSpam Category Spam Suspected spam from blocked senders Viruses Mass-mailing worms Unscannable s Custom-filtered s Message characteristics Identified as spam based on antispam filters designed by Symantec Scored in the suspected spam range you configure Matched against the domain names, IP addresses, or third-party lists queries specified in your Blocked Senders List Virus-infected s s that result from mass-mailing worm attacks Could not be scanned due to size restrictions or other variables Matched against content filters created by the administrator Table 4. Actions available for filtered Available action The message is Benefits/notes Clean the message Notify recipient of unscannable reason Delete the message Deliver the message normally Deliver to recipient s spam folder Forward Modify the message Quarantine Save to disk Cleaned of viruses and delivered to the recipient. Any worms are deleted. Cleaned of viruses and delivered to the recipient. Any worms are deleted. Removed from stream, discarded. Worms automatically deleted. Delivered to recipient s inbox. Moves message, using a server-side rule, to a designated folder in the user s Exchange or Domino mailbox. Sends message to a single administrative account for further scrutiny. Adds a configurable X-header or tags the subject line on a message, for example, X-spam or X-newsletter. The message is sent to the Brightmail Quarantine. Reroutes message to a specified location on an administrative system. Applies to messages classified as viruses. Applies to messages that are large or suspicious enough that filtering is not recommended. No administration or handling is necessary. For spam verdicts, filtering and dropping takes advantage of the Symantec Brightmail AntiSpam % accuracy rate. 1 Useful for testing purposes. Reports and statistics reflecting spam volume can still be generated. Relieves end users and administrators of the burden of using clients to create filters. Allows administrators to review the nature of spam messages targeting your organization using a familiar client (e.g., Microsoft Outlook). Enables user to create simple client-side filters to handle messages Symantec Brightmail AntiSpam has processed. Provides visibility into the spam targeting your organization and assures users that no legitimate mail is lost. Enables purging of messages at the discretion of the administrator. Administrators can easily assign policies for groups that they have defined. Symantec Brightmail AntiSpam supports unlimited numbers of groups of users based on addresses or domain names (wildcards permitted). Each defined group can have unique -filtering actions, based on the seven categories of defined previously. The policies feature also includes support for importing group members from a text file. 1 Anti-Spam Services for SMBs and Middle-Market End-Users, February 25, 2003 Research Note by J.P. Gownder of the Yankee Group 11
15 Automated filter delivery and deployment Symantec Brightmail AntiSpam provides a secure transmission process, ensuring that Scanners at customer sites always have current antispam filters. Every minute, on-site Scanners initiate a secure HTTPS connection with the BLOC. Using this pull-based connection, filter updates flow from the BLOC to the Scanners. Using a similar mechanism, filtering statistics from customer sites are transmitted to the BLOC, allowing the BLOC to gauge the performance and effectiveness of deployed filters. This transmission process has many advantages: Easy administration. Unless they choose to augment antispam filters using the Custom Filters Editor, administrators need never manually write, train, or update existing filters. Up-to-date protection. The Scanners always have the most current antispam filters, and the BLOC has constant visibility into how effectively those filters are performing. Security and privacy. Two-way validation guarantees that filters are coming from Symantec and cannot be spoofed by any other entity. Also, no confidential customer information is transmitted during the collection of the package of aggregate statistics. The sole piece of customer-specific data sent back to Symantec is the originating IP address for each message. Symantec aggregates these IP addresses to proactively identify open relays and open proxies (relaying through another server allows spammers to anonymously disseminate mail). Availability. The filtering software is never stopped during the update process. This capability prevents messages from getting through during the update process, which would leave the mail server unprotected. Once the new filtering rules are loaded, Symantec Brightmail AntiSpam immediately switches over to the new filters. Filtering customization Armed with a constant flow of updated and targeted filters from Symantec, administrators never need to perform ongoing tuning. For more flexibility and control, the Control Center provides methods to modify and customize standard filtering. ADJUSTING SPAM SCORING FOR MORE AGGRESSIVE FILTERING When evaluating messages for spam, Symantec software applies thousands of filters in order to arrive at an overall spam score for each message. To maintain its high accuracy, by default the Scanner sets this threshold value quite high. Some administrators, however, want to tailor the software to reflect the spam tolerance levels of their organization. For example, they may want to be more aggressive in identifying messages that cross a certain threshold. Administrators can specify a range of spam scores that will be considered suspected spam, which is differentiated from legitimate mail and spam. Among the three mutually exclusive classes of messages, suspected spam refers to a gray area of messages that are suspiciously similar to spam, but also share some traits with legitimate messages. After administrators specify a threshold value for their site, the spam score for each message is compared to the threshold value configured for each level. Any messages with scores below the configured suspected spam range will be considered legitimate; any messages above will be considered suspected spam. The key benefit of adjusting the spam scoring is that, using policies, administrators can specify different actions for suspected spam. For example, for a given group of recipients, administrators can choose to delete spam messages and quarantine suspected spam messages for review. Specifying different actions is a good way to handle the possible false positives that may arise from lowering the spam threshold bar. 12
16 TAILORING ACCURACY AND EFFECTIVENESS: ALLOWED AND BLOCKED SENDERS LISTS In some cases, filtering based on the content of the message isn t needed. For example, administrators might want mail from trusted senders or business contacts to always be delivered, regardless of the spam-like nature of the message. Likewise, messages from senders or IP addresses known to send spam or unwanted mail should be treated as spam. In these and other cases, filtering based on the source or sender of the message is a very effective way to deal with spam and minimize false positives unique to your organization. Using a simple interface, administrators can customize the filtering provided by Symantec by: Defining an allowed senders list. Mail coming from an address or connection in an organization s allowed senders list is always treated as legitimate mail. As a result, such mail is delivered immediately to the recipient s inbox, bypassing any other filtering (except antivirus). Defining a blocked senders list. Administrators can specify how Symantec Brightmail AntiSpam processes mail coming from an address or connection in an organization s blocked senders list. A variety of actions can be performed on such mail, including deletion, forwarding, and others. Senders can be specified using the following criteria: addresses and domain names Individual IP connections specified by the administrator IP connections and network information obtained from third-party lists Brightmail Reputation Service Although Symantec Brightmail AntiSpam can query third-party lists of desirable or undesirable domains, IP connections, and networks, the recommended approach is to use the Brightmail Reputation Service. The Brightmail Reputation Service monitors hundreds of thousands of sources to determine how much sent from those addresses is legitimate and how much is spam. This data-driven process provides enough evidence so that mail from a given source can be blocked, allowed, or treated as suspicious based on the source s reputation value. The service is enabled by default and currently includes the following lists of IP addresses: Open Proxy List. IP addresses that are open proxies used by spammers. Safe List. IP addresses from which virtually no outgoing is spam. Suspect List. IP addresses from which virtually all of the outgoing is spam. The lists are continuously compiled, updated, and incorporated by Scanners in the same manner as other filter updates. Multiple quarantine options Symantec Brightmail AntiSpam provides a number of quarantine options for dealing with spam and messages filtered by the Scanner: client based quarantine. Software plug-ins and agents work in concert with Microsoft Outlook and Lotus Domino to create user quarantines integrated within the clients. Web-based quarantine. The Quarantine component provides both user and administrator quarantines. Users can log in over the Web to review their spam. Administrators can manage Quarantine centrally. 13
17 CLIENT-BASED QUARANTINES Using plug-ins available for Microsoft Outlook and Lotus Domino, you can ensure that appropriate messages are automatically directed into each recipient s spam folder, creating an easy-to-manage quarantine for messages identified as spam. By periodically reviewing their personal quarantines, recipients can verify that no legitimate mail was erroneously sidelined. In the unlikely event of a false positive, recipients can provide feedback that will be examined by the BLOC, enabling incremental improvements to the accuracy of the Symantec filters. This quarantine feature provides the following benefits: No need to install and manage client-side antispam software for each employee No need to install separate Scanners onto each server only the lightweight agent No need for users to write their own client-side filters to folder spam No separate login or interface; users can view their quarantine from their mail client WEB-BASED QUARANTINE Quarantine is a storage area for messages filtered by Symantec Brightmail AntiSpam. Using a standard Web browser, users can log in and review spam messages that the Symantec software has quarantined for them. Administrators can access Quarantine and configure settings from the Control Center. Quarantine is installed on the same computer as the Control Center. Organizations deploying Quarantine enjoy the following benefits: Increased user confidence. Viewing caught spam in a central quarantine shows your users the success of your filtering measures. Initially, end users prefer to see messages that have been filtered to assure themselves that no legitimate is lost. As they become familiar with product s accuracy, users will become confident that legitimate mail is rarely, if ever, quarantined. In the case of a false positive, or if users ever decide to keep a message, they can recover it with a few clicks. Administrator View Release message to inbox User View Review and delete quarantined mail Figure 8. Web-based quarantine 14
18 Centralized and simple administration. After initial customization, which includes specifying the retention period for messages and other settings, you don t need to manage Quarantine. In the case of false positives, although you can review false positive submissions, there is no intervention required to get the necessary information to Symantec for incremental filter improvements. Reduced loads on internal mail servers. Downstream mail delivery, storage, and internal network traffic resources are decreased because quarantined spam is stopped before hitting the mail servers. Automatic notification for users. Although users can access their personal quarantine at any time, you can configure Quarantine to send an summary at specific intervals. The summary lists the newly quarantined spam messages and provides links for users to immediately release messages to their inbox or to log in to their personal quarantine and view messages. This notification feature allows users to handle spam quickly and efficiently, rather than dealing with it on a daily or hourly basis. Improved visibility into your spam problem. Administrators have access to all quarantined messages and false positive submissions. The included search feature lets administrators perform quick queries and further examine the spam that is targeting your organization. Release messages directly from Go directly to end-user quarantine Notification Quarantine Summary for [email protected] There are 173 new messages in your Spam Quarantine since you received your last Spam Quarantine Summary. These messages will automatically be deleted after 7 days. To review the complete text of these messages, go to ======================= NEW QUARANTINE MESSAGES ======================== From Subject Date Release View Michael McGee Service Provider Weekly - Get 13 Full Pa... Thu, Release View The Memory Place Memory Price Update for CustomerID:24523 Thu, Release View Tameka Floyd (none) Thu, Release View Discountbiz Corporate Travel Planners, Read All Abou... Thu, Release View DVD Copying Software Copies Everything - Easy Download or Dis.. Thu, System monitoring To make system monitoring easier, Symantec Brightmail AntiSpam provides tools to let administrators: View status of all Scanners in your network Produce detailed reports summarizing spam and virus filtering Examine logs Set up event-based alerts VIEWING STATUS You can easily view detailed status for all your configured Scanners and for Quarantine from one central location on the Control Center. The Status page lists: Quarantine information (if applicable) The configured Scanners in your network, along with any associated components The basic status (running or not) of the configured hosts and components. Viewing Status Start and stop all or individual components Check Quarantine details Verify component status Ensure that filters are up-to-date DETAILED REPORTS Symantec Brightmail AntiSpam provides 19 reports summarizing detailed statistics of antispam or antivirus effectiveness at your site. Reporting data provides administrators with key metrics to show the value of Symantec Brightmail AntiSpam as a filtering solution at their site. They can also leverage the collected statistics and spam trend information to help plan for the ongoing storage and resource needs for Symantec Brightmail AntiSpam. The reports provide the following features: Granular reporting. Create lists of the most spammed users, most abusive senders, and other reports. Armed with this information, administrators can take proactive measures, such as blocking specific domains and educating employees on how to avoid spam. 15
19 Consolidated statistics in local time. Analyze consolidated filtering performance for all Scanners and investigate spam and virus attacks targeting your organization. Regardless of where the Scanners are deployed, reporting data is conveniently presented in the local time zone where the Control Center is located. Export. Export report data for use in any reporting or spreadsheet software for further analysis. Flexible generation and delivery. Schedule reports to be ed at specified intervals. COMPREHENSIVE LOGS Each Scanner maintains a database of log information. These logs are all consolidated for viewing within the Control Center. Logging helps diagnose error conditions and keep track of many aspects of the system during its operation. Logging levels can be set on a five-point sliding scale, and the settings can apply to individual Symantec Brightmail AntiSpam computers or to all. Log filters can also be set at the component level. For example, administrators might choose to log severe errors only for the server component. Administrators can also designate the maximum size and retention period for entries in the log database and save logs to a text file for further review. PROACTIVE ALERTS Symantec Brightmail AntiSpam generates alerts when certain operating conditions arise. Symantec Brightmail AntiSpam can automatically send alerts to administrators or other parties when the following conditions arise: A component is not responding or working Antispam filters are older than a specified time Antivirus filters are older than a specified time Quarantine is low on disk space Empowering users Symantec Brightmail AntiSpam enables end users to manage spam on the desktop. User involvement is important to address that final percentage of spam that cannot be addressed adequately on a global basis. Optional plug-ins and agents, available for popular clients, empower users to take control of their inboxes. The Brightmail Plug-In for Outlook is now in its second generation. From a convenient Outlook toolbar, your users can: Create a personal Blocked Senders List. Users can specify addresses that will always be blocked. While this is unlikely to be effective against professional spammers, who constantly spoof and change their addresses and domains, this approach can be used to block unwanted newsletters or annoying senders. These entries are in addition to those defined by administrators using the Control Center. Create a personal trusted senders list. Trusted-sender lists let users designate senders who are allowed to bypass antispam filtering. These lists reduce the number of false positives and are a good approach to dealing with legitimate bulk mail or subscriptions that can look like spam. Specify language preference. To ward off the growing problem of multilingual spam, users can either specify languages in which they want to receive or in which they don t want to receive . All others will be blocked. Automatically import Outlook data. The plug-in interacts with the Outlook address book and message submissions. The plug-in can automatically compile a list of trusted senders from saved mail and the Outlook contact list. 16
20 Report false positives and missed spam. Symantec Brightmail AntiSpam can sometimes miss spam or, in rare instances, produce a false positive. In these circumstances, the plug-in provides a simple way for your users to notify Symantec about the problem with no administrator action required. Users can immediately submit missed spam or false positives to Symantec for analysis. If appropriate, Symantec will adjust filters to make Symantec Brightmail AntiSpam more effective and accurate. Symantec also includes a similar mechanism for Lotus Notes and Domino users. Using a special menu, Domino users can submit misidentified messages to Symantec. Deployment of the plug-in and other end-user software provides important benefits to the Symantec customer base at large. The distributed submission mechanism greatly increases the reach of the Probe Network, and also gives Symantec continuous visibility into the latest trends and tactics used by spammers. If necessary, Symantec feeds new information from plug-in submissions back into its filter creation, which ultimately increases the antispam protection of all customers. Conclusion Accounting for over half of all Internet mail traffic, the volume of spam continues to grow. Organizations can no longer afford to ignore the flood of spam targeting their servers and employees. The costs in terms of lost IT resources, employee productivity, and legal liability are simply too great. Spam protection is no longer an option it s a necessity. Symantec Brightmail AntiSpam, a comprehensive antispam solution that currently protects over 300 million mailboxes, outpaces the competition on many dimensions, including effectiveness, accuracy, and ease of use. Symantec Brightmail AntiSpam provides: Multilayered spam protection. With over 17 filtering technologies, it catches more spam while allowing legitimate to reach end users. Flexible spam management and mail policies. Armed with powerful tools, policies to handle filtered mail, multiple quarantines, and other manageability aids, the administrator can easily customize Symantec Brightmail AntiSpam to meet the unique requirements of end users and groups in the organization. Powerful administration. An intuitive Web-based Control Center reduces administrator time and effort required to deploy policies and oversee the system. Detailed reporting. Comprehensive reports provide consolidated data on mail flow and filtering activities, giving administrators and managers visibility into how the system is delivering on its business function. Content filtering abilities. Flexible block/allow lists and a powerful content filtering editor enables administrators to revise or expand the definition of unwanted to match the changing requirements of the organization. Per-user spam control. Plug-ins and other tools augment popular clients, enabling end users to take control of their inboxes. For example, users can set up personal allow and block lists, or specify the language in which they want to receive mail. Comprehensive threat protection. Optional antivirus protection and automatic antifraud filters mitigate the risk of other threats, including -borne viruses and phishing. For more information, visit Symantec and the Symantec logo are U.S. registered trademarks of Symantec Corporation. BLOC, Brightmail, Brightmail AntiSpam, Brightmail Reputation Service, and Probe Network are trademarks of Symantec Corporation. Domino, Lotus, and Lotus Notes are trademarks of International Business Machines Corporation in the United States, other countries, or both. Microsoft, Outlook, and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Solaris is a trademark or registered trademark of Sun Microsystems, Inc., in the U.S. or other countries. All other brand and product names are the property of their respective owners. Copyright 2004 Symantec Corporation. All rights reserved. Printed in the USA. 08/ WORLD HEADQUARTERS Stevens Creek Blvd. Cupertino, CA U.S.A For Product Information in the U.S., call toll-free Symantec has worldwide operations in 35 countries. For specific country offices and contact numbers please visit our Web site.
Symantec Messaging Gateway 10.5
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
Symantec Messaging Gateway 10.6
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
TECHNOLOGY BRIEF: ENTERPRISE SOLUTIONS. Symantec Premium AntiSpam Evaluation Guide
TECHNOLOGY BRIEF: ENTERPRISE SOLUTIONS Symantec Premium AntiSpam Evaluation Guide White Paper: Symantec Enterprise Solutions Symantec Premium AntiSpam Evaluation Guide Contents Executive Summary..............................................................2
Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex
Symantec Messaging Gateway for Service Providers 10.5. Implementation Guide
Symantec Messaging Gateway for Service Providers 10.5 Implementation Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of
Solution Brief: Enterprise Security
Symantec Brightmail Gateway and VMware Solution Brief: Enterprise Security Symantec Brightmail Gateway and VMware Contents Corporate overview......................................................................................
Symantec Messaging Gateway powered by Brightmail
The first name in messaging security powered by Brightmail Overview, delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus protection, advanced
Intercept Anti-Spam Quick Start Guide
Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5
Stop Spam. Save Time.
Stop Spam. Save Time. A Trend Micro White Paper I January 2015 Stop Spam. Save Time. Hosted Email Security: How It Works» A Trend Micro White Paper January 2015 TABLE OF CONTENTS Introduction 3 Solution
Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.
PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information
Trend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading
Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure
Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus
Anti-Phishing Best Practices for ISPs and Mailbox Providers
Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing
Symantec Protection Suite Add-On for Hosted Email and Web Security
Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication
Symantec Email Security.cloud - Skeptic Whitepaper
TECHNICAL BRIEF: SYMANTEC EMAIL SECURITY.CLOUD........................................ Symantec Email Security.cloud - Skeptic Whitepaper Who should read this paper This white paper outlines the technical
Comprehensive Anti-Spam Service
Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive
Trend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3
System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security
Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems
Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control
Award-winning messaging security for inbound protection and outbound control Overview The delivers inbound and outbound messaging security for email and IM, with effective and accurate antispam and antivirus
AntiVirus and AntiSpam email scanning The Axigen-Kaspersky solution
AntiVirus and AntiSpam email scanning The Axigen-Kaspersky solution The present document offers a comprehensive analysis of the ways to secure corporate email systems. It provides an expert opinion on
E-MAIL FILTERING FAQ
V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:
Symantec AntiVirus Enterprise Edition
Symantec AntiVirus Enterprise Edition Comprehensive threat protection for every network tier, including client-based spyware prot e c t i o n, in a single product suite Overview Symantec AntiVirus Enterprise
Eiteasy s Enterprise Email Filter
Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer
Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered
eprism Email Security Suite
FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks
Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5
Contents Paul Bunyan Net Email Filter 1 What is the Paul Bunyan Net Email Filter? 1 How do I get to the Email Filter? 1 How do I release a message from the Email Filter? 1 How do I delete messages listed
Using Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education
White Paper Using Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education Online criminals are constantly looking for new ways to reach their targets
COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007
COMBATING SPAM Best Practices March 2007 OVERVIEW Spam, Spam, More Spam and Now Spyware, Fraud and Forgery Spam used to be just annoying, but today its impact on an organization can be costly in many different
IronPort Plug-in for Outlook VERSION 1.8 ADMINISTRATOR GUIDE
IronPort Plug-in for Outlook VERSION 1.8 ADMINISTRATOR GUIDE COPYRIGHT Copyright 2007 by IronPort Systems Inc. All rights reserved. Part Number: 421-0065B Revision Date: October 23, 2007 The IronPort logo,
Symantec Hosted Mail Security Getting Started Guide
Symantec Hosted Mail Security Getting Started Guide Redirecting Your MX Record You have successfully activated your domain within the Symantec Hosted Mail Security Console. In order to begin the filtration
ModusMail Software Instructions.
ModusMail Software Instructions. Table of Contents Basic Quarantine Report Information. 2 Starting A WebMail Session. 3 WebMail Interface. 4 WebMail Setting overview (See Settings Interface).. 5 Account
IronPort C300 for Medium-Sized Enterprises and Satellite Offices
I r o n P o r t A p p l i a n c e s H I G H - P E R F O R M A N C E E M A I L S E C U R I T Y. C A R R I E R - P R O V E N T E C H N O L O G Y. E N T E R P R I S E - C L A S S M A N A G E M E N T. IronPort
SonicWALL Anti-Spam Desktop User Guide
SonicWALL Anti-Spam Desktop User Guide Version 6.2 SonicWALL, Inc. 2001 Logic Drive San Jose, CA 95124-3452 Phone: +1.408.745.9600 Fax: +1.408.745.9300 E-mail: [email protected] Part Number: 232-001812-00
ContentCatcher. Voyant Strategies. Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering
Voyant Strategies ContentCatcher Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering tm No one can argue that E-mail has become one of the most important tools for the successful
Cloud Services. Email Anti-Spam. Admin Guide
Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...
Reviewer s Guide. PureMessage for Windows/Exchange Product tour 1
Reviewer s Guide PureMessage for Windows/Exchange Product tour 1 REVIEWER S GUIDE: SOPHOS PUREMESSAGE FOR LOTUS DOMINO WELCOME Welcome to the reviewer s guide for Sophos PureMessage for Lotus Domino, one
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses
A simple, effective and affordable solution designed for small businesses Overview Symantec Protection Suite Small Business Edition is a simple, affordable, security and backup solution. It is designed
USER S MANUAL Cloud Email Firewall 4.3.2.4 1. Cloud Email & Web Security
USER S MANUAL Cloud Email Firewall 4.3.2.4 1 Contents 1. INTRODUCTION TO CLOUD EMAIL FIREWALL... 4 1.1. WHAT IS CLOUD EMAIL FIREWALL?... 4 1.1.1. What makes Cloud Email Firewall different?... 4 1.1.2.
eprism Email Security Appliance 6.0 Release Notes What's New in 6.0
eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably
No filter is perfect. But with your help, MailCleaner may aim at perfection. Case Description Solution
A Filter inaccuracies No filter is perfect. But with your help, MailCleaner may aim at perfection. The filtering system implemented by MailCleaner relies on automated and systematic controls that cannot
Symantec Hosted Mail Security Administration Guide
Symantec Hosted Mail Security Administration Guide Symantec Hosted Mail Security Administration Guide Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software
1.1.1. What makes Panda Cloud Email Protection different?... 4. 1.1.2. Is it secure?... 4. 1.2.1. How messages are classified... 5
Contents 1. INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 4 1.1. WHAT IS PANDA CLOUD EMAIL PROTECTION?... 4 1.1.1. What makes Panda Cloud Email Protection different?... 4 1.1.2. Is it secure?... 4 1.2.
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete
Quarterly Report: Symantec Intelligence Quarterly
Symantec Intelligence Quarterly: Best Practices and Methodologies Quarterly Report: Symantec Intelligence Quarterly Symantec Intelligence Quarterly: Best Practices and Methodologies Contents Symantec
Mailwall Remote Features Tour Datasheet
Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for
INFORMATION PROTECTED
INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never
ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY 2006. SurfControl Email Filter. www.westcoastlabs.org
ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY 2006 SurfControl Email Filter 2 ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT Contents SurfControl Email Filter Test objectives and scenario...3 Test network...4
IBM Express Managed Security Services for Email Security. Anti-Spam Administrator s Guide. Version 5.32
IBM Express Managed Security Services for Email Security Anti-Spam Administrator s Guide Version 5.32 Table of Contents 1. Service overview... 3 1.1 Welcome... 3 1.2 Anti-Spam (AS) features... 3 1.3 How
Email AntiSpam. Administrator Guide and Spam Manager Deployment Guide
Email AntiSpam Administrator Guide and Spam Manager Deployment Guide AntiSpam Administration and Spam Manager Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec
Symantec Mail Security for Domino
Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database
THE INFOCROSSING SECURE EMAIL BOUNDARY SERVICE
THE INFOCROSSING SECURE EMAIL BOUNDARY SERVICE EMAIL BORNE THREATS An Escalating Problem for Every Business More than three out of four emails contain spam, viruses or other malicious content and that
Overview An Evolution. Improving Trust, Confidence & Safety working together to fight the e-mail beast. Microsoft's online safety strategy
Overview An Evolution Improving Trust, Confidence & Safety working together to fight the e-mail beast Holistic strategy Prescriptive guidance and user education, collaboration & technology Evolution of
Symantec Hosted Mail Security. Console and Spam Quarantine User Guide
Symantec Hosted Mail Security Console and Spam Quarantine User Guide Symantec Hosted Mail Security Console and Spam Quarantine User Guide The software described in this book is furnished under a license
Symantec Mail Security Planning Guide
Symantec Mail Security Planning Guide Syamantec Mail Security Planning Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms
SPAM FILTER Service Data Sheet
Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic
Mail-SeCure for virtualized environment
OUR INNOVATION YOUR SECURITY Mail-SeCure for virtualized environment OVERVIEW More and more companies are moving towards a virtualized IT-environment, where several network services (email, web surfing
Commtouch RPD Technology. Network Based Protection Against Email-Borne Threats
Network Based Protection Against Email-Borne Threats Fighting Spam, Phishing and Malware Spam, phishing and email-borne malware such as viruses and worms are most often released in large quantities in
PureMessage for Microsoft Exchange Help. Product version: 4.0
PureMessage for Microsoft Exchange Help Product version: 4.0 Document date: July 2013 Contents 1 About PureMessage for Microsoft Exchange...3 2 Key concepts...4 3 Administration console...7 4 Monitoring...9
Tufts Technology Services (TTS) Proofpoint Frequently Asked Questions (FAQ)
Tufts Technology Services (TTS) Proofpoint Frequently Asked Questions (FAQ) What is Proofpoint?... 2 What is an End User Digest?... 2 In my End User Digest I see an email that is not spam. What are my
T E C H N I C A L S A L E S S O L U T I O N
Trend Micro Email Encryption Gateway 5.0 Deployment Guide January 2009 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 USA T +1.800.228.5651 / +1.408.257.1500 F +1.408.257.2003 www.trendmicro.com
Symantec Protection Suite Small Business Edition
Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business Edition is an easyto-use, all-in-one suite that secures your critical business assets and information against today
WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
IronPort C-Series Overview High performance email security appliances. Carrier-proven technology, enterprise-class management.
Overview IronPort C-Series Overview High performance email security appliances. Carrier-proven technology, enterprise-class management. The IronPort C-Series email security appliances provide advanced
Spam Testing Methodology Opus One, Inc. March, 2007
Spam Testing Methodology Opus One, Inc. March, 2007 This document describes Opus One s testing methodology for anti-spam products. This methodology has been used, largely unchanged, for four tests published
Features and benefits guide for partners and their customers
and benefits guide for partners and their customers Version 3.0 and Guide for Partners and their customers Security Anti Virus Proofpoint s own threat detection technology enables our email Anti-Virus
IronPort C10 for Small and Medium Businesses
I r o n P o r t A p p l i a n c e s S I M P L E I N S TA L L AT I O N, E A S Y M A N A G E M E N T, A N D P O W E R F U L P R O T E C T I O N F O R Y O U R E M A I L I N F R A S T R U C T U R E. IronPort
Thexyz Premium Webmail
Webmail Access all the benefits of a desktop program without being tied to the desktop. Log into Thexyz Email from your desktop, laptop, or mobile phone, and get instant access to email, calendars, contacts,
Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices
Data Sheet Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices Medium-sized enterprises face the same daunting challenges as the Fortune 500 and Global 2000 - higher mail volumes and
V1.4. Spambrella Email Continuity SaaS. August 2
V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable
About this documentation
Wilkes University, Staff, and Students have a new email spam filter to protect against unwanted email messages. Barracuda SPAM Firewall will filter email for all campus email accounts before it gets to
PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1
PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1 Contents 1. INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 4 1.1. WHAT IS PANDA CLOUD EMAIL PROTECTION?... 4 1.1.1. Why is Panda Cloud Email Protection
Small and Midsize Business Protection Guide
P r o t e c t i o n G u i d e : C l o s e t h e P r o t e c t i o n G a p Small and Midsize Business Protection Guide Close the protection gap and safeguard your business future Confidence in a connected
PROOFPOINT - EMAIL SPAM FILTER
416 Morrill Hall of Agriculture Hall Michigan State University 517-355-3776 http://support.anr.msu.edu [email protected] PROOFPOINT - EMAIL SPAM FILTER Contents PROOFPOINT - EMAIL SPAM FILTER... 1 INTRODUCTION...
Get Started Guide - PC Tools Internet Security
Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools
Migration Quick Reference Guide for Administrators
Migration Quick Reference Guide for Administrators 10 Easy Steps for Migration Maximize Performance with Easy Settings Changes Communicating with Your Users Reporting Spam Resources Page 1 10 Easy Steps
Barracuda Spam Firewall
Barracuda Spam Firewall Overview The Barracuda Spam Firewall is a network appliance that scans every piece of email our organization receives. Its main purposes are to reduce the amount of spam we receive
INSIDE. Malicious Threats of Peer-to-Peer Networking
Symantec Security Response WHITE PAPER Malicious Threats of Peer-to-Peer Networking by Eric Chien, Symantec Security Response INSIDE Background Protocols New Vector of Delivery Malicious Uses of Peer-to-Peer
MESSAGING SECURITY GATEWAY. Detect attacks before they enter your network
MESSAGING SECURITY GATEWAY Detect attacks before they enter your network OVERVIEW This document explains the functionality of F-Secure Messaging Security Gateway (MSG) what it is, what it does, and how
Introduction. How does email filtering work? What is the Quarantine? What is an End User Digest?
Introduction The purpose of this memo is to explain how the email that originates from outside this organization is processed, and to describe the tools that you can use to manage your personal spam quarantine.
PreciseMail Overview - The Email Threat
PreciseMail Overview - The Email Threat Spam, viruses, and other malware are a converging email threat that produce more sophisticated attacks which can result in significant damage to an organization
Purchase College Barracuda Anti-Spam Firewall User s Guide
Purchase College Barracuda Anti-Spam Firewall User s Guide What is a Barracuda Anti-Spam Firewall? Computing and Telecommunications Services (CTS) has implemented a new Barracuda Anti-Spam Firewall to
Microsoft Exchange Online from BT. Service Description (Shared Platform)
Microsoft Exchange Online from BT Version 5.1 January 2004 Confidentiality statement All information contained in this document is provided in confidence for the sole purpose of adjudication, and shall
